skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 99002 Find in a Library
Title: Security for Personal Computers - A Growing Concern
Journal: Computer Security  Volume:3  Issue:1  Dated:(Summer 1984)  Pages:33-40
Author(s): D D Steinauer
Date Published: 1984
Page Count: 8
Format: Article
Language: English
Country: United States of America
Annotation: The increasing use of personal computers in business raises concerns about security. Equipment must be protected, though this is less important than protecting data which is stored on PC media and processed through PCs.
Abstract: The lack of specific hardware security features and operating systems without privileged instructions calls for greater emphasis on physical access controls, careful media management (with attention to 'erased' but still-readable files), and consideration of encryption as a means of increasing data security. Other important security areas are contingency planning (especially equipment and software compatibility), auditability, and access to host mainframe systems. A new opportunity is the chance to isolate sensitive applications on dedicated, non-communication systems. In general, the 'traditional' computer security measures are still important and adequate in the PC world. Management must recognize its responsibility for protecting information, not machines, and should use a risk-management approach to implementing security measures. (Publisher abstract)
Index Term(s): Computer privacy and security; Microcomputer systems
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.